Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-1147


A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.


Published

2025-02-10T14:15:29.643

Last Modified

2025-04-04T23:15:41.910

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 3.1 (LOW)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

4.9

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-119
    CWE-120
  • Type: Secondary
    CWE-120

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu binutils 2.43 Yes

References